Sciweavers

703 search results - page 13 / 141
» Graph-based anomaly detection
Sort
View
IPPS
1999
IEEE
14 years 26 days ago
A Graph Based Framework to Detect Optimal Memory Layouts for Improving Data Locality
In order to extract high levels of performance from modern parallel architectures, the effective management of deep memory hierarchies is very important. While architectural advan...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
IJAIT
2008
88views more  IJAIT 2008»
13 years 8 months ago
Outrank: a Graph-Based Outlier Detection Framework Using Random Walk
H. D. K. Moonesinghe, Pang-Ning Tan
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
14 years 3 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
ACSAC
1998
IEEE
14 years 26 days ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
13 years 7 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...